Premium Essay

Hat Task1

In: Other Topics

Submitted By dmarti11
Words 4751
Pages 20
Community Health Nursing
HAT: Task 1
Darcie M. Walker
January 12, 2012

A1-A2: Community Assessment and Data Interpretation
The state of Indiana can show you many different areas of living along with multiple cultures that make the great state what it is. Living in a small town for many years, and relocating to a larger city has been extremely eye opening to see all of those cultures in action.
POPULATION ECONOMIC STATUS ASSESSMENT: From statistical findings from the Census Bureau, Marion County has a population of 705,376 people aged 16 years old and over. Of that number of individuals, 474,362 are in the work force, which leaves the number of unemployed individuals at 8.1%. Some of the occupations held are as follows: service occupations, managements, sale, business, construction, health care, retail, transportation, finance, insurance, and many more
Out of 358,552 households in Marion County, the income and benefits in adjusted dollars are as follows: * Less than 10,000 34,829 * 10,000-14,999 23,694 * 15,000-24,999 51,518 * 25,000-34,999 47,791 * 35,000-49,999 55,856 * 50,000-74,999 62,475 * 75,000-99,999 37,400 * 100,000-149,999 29,927 * 150,000-199,999 8,144 * 200,000 or more 6,918
The median household income is $39,631, and the mean household income is $54,764. The families receiving cash public assistance are 11,968, and the families with food stamps are 59,600 in the last 12 months. Marion County is located in Indiana, which holds Indianapolis, the states capitol. The 2010 census reported a total area of 403.1 square miles. It is home to five interstate highways, six US highways, and three Indiana highways. It has a recorded population according to the census of 903,393 making this county the largest in the state and the 55th most occupied county...

Similar Documents

Free Essay

Found Poem

...Found Poem – Harry potter Oh, you may not think I’m pretty, But don’t judge on what you see, I’ll eat myself if you can find A smarter hat than me. You can keep you bowlers black, Your top hats sleek and tall, And I can cap them all, There’s nothing hidden in your head, The sorting hat can’t see. So try me on and I will tell you, Where you ought to be. You might belong to Gryffindor, Where dwell the brave at heart; Their daring never and chivalry Set Gryffindor apart; Red and Gold, “We’ll teach all those With brave deeds to their name.” Welcome to Gryffindor! You might belong to Gryffindor, Where dwell the brave at heart; Their daring never and chivalry Set Gryffindor apart; Red and Gold, “We’ll teach all those With brave deeds to their name.” Welcome to Gryffindor! You might belong in Hufflepuff, Where they are just and loyal, Those patient Hufflepuff are true, And unafraid of toil; Yellow and Black, “We’ll teach the lot, And treat them just the same.” Welcome to Hufflepuff! You might belong in Hufflepuff, Where they are just and loyal, Those patient Hufflepuff are true, And unafraid of toil; Yellow and Black, “We’ll teach the lot, And treat them just the same.” Welcome to Hufflepuff! Or yet in wide of Ravenclaw, If you’ve a ready mind, Where those of wit and learning, Will always find their kind; Blue and Bronze, “We’ll teach those whose Intelligence is surest.” Welcome to Ravenclaw! Or yet in wide of Ravenclaw, If......

Words: 378 - Pages: 2

Free Essay

Task for English

...Keywords Task Bare essentials - (expression) the minimum Stroll - (verb) to walk without hurrying, usually for fun Knitted - (adjective) made from wool, usually jumpers, scarves and hats. Weep - (verb) to cry Flipper - Stillettos (noun - plural) Helen is packing for her holiday. Her friend Julia is with her. Listen to their conversation. How many types of clothes can you hear them say? True or False? 1. Helen is going to Turkey. 2. She is going to stay for 3 days. 3. She isn’t taking a jumper. 4. She is going to wear a dress on the journey. 5. Her hat is big. 6. She is going to take some skirts. 7. Listen to the conversation again. Fill in the missing words in the text below. Going abroad? Your mother still does your packing for you? Maybe she should! Listen to a conversation between two friends and weep. Julia: So where are you off to? Helen: Egypt. Julia: How long for? Helen: Oh, it’s just a _______ 3 days. Julia: And you’re taking that _______ suitcase? Helen: Yes. I think I’ve got everything. Julia: What on earth have you got in there? Do you mind if I have a look? Helen: Sure. Julia: It’s quite _______! Helen: It’s the bare essentials. Julia: Why do you need a fur coat with you? Helen: I’ve never been to Egypt before. It might be _______. Julia: And the seven pairs of knickers? Helen: You can _______ have too much underwear! Julia: But you’re there for three days! And what are these? Shoes or flippers? Helen:......

Words: 418 - Pages: 2

Free Essay


...RESEARCH MET R THODOL LOGY (G GEN 501 SESSION M) 1; Assi ignment # 1 Part I: Ascertain wh you are looking for in an Advi A hat r isor. w -out descript tion of what your person needs mi nal ight be for an effective n Write a well thoughtadvisor for you, so th you can produce an effective thes Include an idealized description of f hat p e sis. d n the chara acteristics in a thesis adv visor that you are seeking – an adviso which wo u g or ould best suit t your indi ividual needs. This shou be around 250-500 w uld words in leng gth. ur tes. Part II: Identify you candidat h ounds of the individual PHBS full-ti faculty m P ime members (*) and identify 2-3 ) fy Research the backgro of them that you mig consider as a thesis ad t ght dvisor; desig gnate specifi faculty tha seem “right” fic at for you. For each fac culty person that you ide n entify, elucid why he/ date /she may be a good fit fo or you, give your need or desires. This should be around 250-500 wo in length en ds . d ords h. Notes: pose of this assignment is to get you thinking abo an adviso and articu a out or ulating those e The purp thoughts…For this as ssignment, it is hoped th you actua spend m t hat ally more time thin nking and researchi than the time writing ing g! he HBS (*) See th online PH faculty roster: http://eng ndex.php?m= =content&c= =index&a=li ists&catid=6 627...

Words: 286 - Pages: 2

Free Essay


...old woman lived in this desolate spot with only her daughter and she had never seen Mr. Shiftlet before, she could tell, even from a distance, that he was a tramp and no one to be afraid of. His left coat sleeve was folded up to show there was only half an arm in it and his gaunt figure listed slightly to the side as if the breeze were pushing him. He had on a black town suit and a brown felt hat that was turned up in the front and down in the back and he carried a tin tool box by a handle. He came on, at an amble, up her road, his face turned toward the sun which appeared to be balancing itself on the peak of a small mountain.The old woman didn't change her position until he was almost into her yard; then she rose with one hand fisted on her hip. The daughter, a large girl in a short blue organdy dress, saw him all at once and jumped up and began to stamp and point and make excited speechless sounds.Mr. Shiftlet stopped just inside the yard and set his box on the ground and tipped his hat at her as if she were not in the least afflicted; then he turned toward the old woman and swung the hat all the way off. He had long black slick hair that hung flat from a part in the middle to beyond the tips of his ears on either side. His face descended in forehead for more than half its length and ended suddenly with his features just balanced over a jutting steeltrap jaw. He seemed to be a young man but he had a look of composed dissatisfaction as if he understood life......

Words: 4780 - Pages: 20

Free Essay

Hands on Project 2-1

...1. a. You can, but you should really install the latest and the current Fedora Core release. b. The Fedora official web page: c. 2. a. * Linux treats all hardware as devices, but interacts differently with different devices. Storage capacity on a computer is measured in bytes. A byte is composed of 8 bits and can store one character. Computers are capable of storing many characters, and storage is typically determined in megabytes (MB), 1,048,576 bytes, and gigabytes (GB), 1024 MB. * Many companies do not provide device drivers that support Linux. Instead, they rely on the free software development community to develop the appropriate drivers. For this reason, the newer a hardware device is, the less likely it is to be supported. * Linux OSes have a much lower threshold than Microsoft's Windows 7 and Windows 8 and Apples's Mac OS X. So system resources are less of an issue than system compatibility. That means you can run the latest Linux OS without having to buy a more expensive new computer. b. Unsupported drivers and lack of applications for a particular Linux distribution. c. * Samba Server - OpenLDAP Linux Packages * Processor: Dual core 3.4Ghz …To handle the workload of multiple user file sharing speed * RAM:,2GB of DDR2 dual channel RAM…To allow for faster data......

Words: 374 - Pages: 2

Premium Essay

Ethical Hacking

...Danish Jamil et al. / International Journal of Engineering Science and Technology (IJEST) IS ETHICAL HACKING ETHICAL? DANISH JAMIL Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan MUHAMMAD NUMAN ALI KHAN Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan Abstract : This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always reporting some......

Words: 3974 - Pages: 16

Free Essay

Ethical Hacking

...Paul Gaydos February 8, 2011 SECR 5080 – Research Topic #2 Research Topic – Ethical Hacking 1. This is a Network World article talking about the legal risks of ethical hacking. The article talks about whether or not ethical hackers risk prosecution themselves. The articles discusses developing a set of ethical guidelines that can be shown to the government when and if they starting taking a greater role in oversight. It mentions that it might be a good idea to work with law enforcements when it comes to ethical hacking. 2. This site provides information about becoming a certified ethical hacker. The group doing the certifying is the International Council of E-Commerce Consultants (EC-Council). This is a member-based organization that certifies individuals in various e-business and information security skills. The site provides a great FAQ, exam info, where to get training, and the path to get certified as an ethical hacker. 3. This is a great online forum for those who are ethical hackers, or interested in becoming one. The page warns that the forum is only for ethical or as a learning purpose. It gives many tips, tricks, and tutorials share amongst other ethical hackers in this online community. 4. This company offers penetration......

Words: 339 - Pages: 2

Free Essay

Jboss Interview Question

...JBOSS INTERVIEW QUESTIONS Q:How can you start a JTA transaction from a Servlet deployed on JBoss ? A: JBoss registers in the JNDI tree a JTA UserTransaction Object which can be user to manage a distributed transaction Q:What do you need to set-up a cluster with JBoss ? A: Basically starting JBoss with the “all” configuration contains everything needed for clustering: It has all the libraries for clustering: JGroups.jar, jboss-cache.jar Clustered beans (cluster-service.xml) HA-JNDI HTTP session replications (tc5-cluster-service.xml) Farming HA-JMS Q:Which component handles cluster communication in JBoss ? A: The JGroups framework provides services to enable peer-to-peer communications between nodes in a cluster. It is built on top a stack of network communication protocols that provide transport, discovery, reliability and failure detection, and cluster membership management services.    Q:Is it possible to put a JBoss server instance into multiple cluster at the same time ? A: It is technically possible to put a JBoss server instance into multiple clusters at the same time, this practice is generally not recommended, as it increases the management complexity. Q:What's jBoss cache in short ? A: JBossCache enables easy distribution of datasets across your computing environments. It is based on JGroups and enables clustering and high availability of that data. You may choose to distribute the data with JBoss Messaging to move it where it is needed for......

Words: 650 - Pages: 3

Premium Essay

Computer Crime

...cases their knowledge is actually useful and most are authorized to hack into the systems. Some Hackers believe that hacking is a learning experience; including creative problem solving and educating others about the vulnerabilities with computer security. I feel that Hackers that are trying to protect other people are the Hackers that don’t find themselves criminals; however it is hard to determine in certain cases and situations what is legal and illegal hacking. The White Hat Hacker is the Hacker that wouldn’t consider their job a crime; some have graduated from college and work for large companies testing software, testing defenses, and creating defenses. Although they use their knowledge in a legal manner there are those that use their skills in an illegal manner. The Gray and Black Hat Hackers do use their skills in an unethical manner. The Gray Hackers usually performs in an ethical manner; however in certain occasions they enjoy hacking even if it is an illegal system they are hacking into. The Black Hat Hacker...

Words: 697 - Pages: 3

Premium Essay

Ethical Hacking Essay

...Ethical Hacking Essay Introduction Almost 90 percent of our society now depends on complex computer based system. With the increasingly use of computer and explosive growth of the Internet has brought many good things: electronic commerce, online banking, e-mail, video conferencing etc. The improvement of systems security to prevent criminal hacker has become an important concern to society. There are many ways to protect those information systems; it seems that the Ethical Hacking is a better way. Therefore, whether to teach or not teach the "Ethical Hacking" as a course in Tertiary education has become an interesting argument. In this article will analysis the ethical, legal, and ethical implications of this issue. In order to discuss the ethical, legal, and social implications of this issue, one has to understand the definition of Ethical Hacking. The Word Spy states that "Ethical hacking is a computer hacker who attempts to infiltrate a secure computer system in an effort to learn the system's weaknesses so that they can be repaired" (The Word Spy, 2003). The question arises here is whether Ethical Hacking is ethical or unethical. Ethical The "Computer Ethics" states in part that all information belongs to everyone and there should be no boundaries or restraints to prevent disclosure of this information (Johnson, 1994). From most hacker's perspective, freedom of information includes the right to source codes and the programs themselves. This freedom also......

Words: 1017 - Pages: 5

Free Essay

People Manager Prgramme

...advantages of social media are: * connect with distant friends and family * play games with friends and make new friends * learn about new things and research topics of interest * watch films, videos and TV shows from around the world * listen to music from 100's of different artists however with a positive there is also a negative these are: * stalkers, people who learn about your personal life and find ways to blackmail you into inappropriate tasks * pedophiles, people who ask for 'nudes' from both genders who are considered minors * 'hackers', these are people who gain access to personal files without permission. hackers fall into two categories these are; white hat hackers, who hack in to files to improve their efficiency and/or security or black hat hackers, who hack in to networks for personal or financial gain, not to help others. * cyberbulling, people who send hertful messages to other people on social media website * propaganda, people who spred mass lies to hundreds of people about a certain topic. and through all this we still use these site from day to day blind to the risks. so the next time you use a social media website such as face book take a minute to think about the risks....

Words: 269 - Pages: 2

Free Essay

Cis 206 Slingshot Academy / Tutorialrank.Com

...CIS 206 All iLabs: Devry University (DEVRY) For more course tutorials visit CIS 206 All iLabs: Devry University ----------------------------------------------------------- CIS 206 Case Study 2-3 Discussing the Functions of an Operating System (DEVRY) For more course tutorials visit You have been selected to present a short talk on the functions of an operating system for the weekly tech meeting. To support your talk, you must prepare a handout for the attendees. The handout should summarize the information that you have learned about this topic. ----------------------------------------------------------- CIS 206 Case Study 2-4 Discussing How Applications Interact with Operating Systems (DEVRY) For more course tutorials visit You have been asked to prepare a short lecture for users in the Accounting Department. They have expressed interest in learning more about how the operating system supports the applications they use. Your boss would like to review your lecture notes prior to the class, so you need to save them to a document. Your notes should provide details of your lecture. ----------------------------------------------------------- CIS 206 Case Study 8-2 Researching Background and Font Combinations in Fedora Core 4 (DEVRY) For more course tutorials visit Case 8-2: Researching Background and Font Combinations in Fedora Core 4 You have been asked to......

Words: 3261 - Pages: 14

Premium Essay

Layout Design

...Automation Automation is the use of machines, control systems and information technologies to optimize productivity in the production of goods and delivery of services. The correct incentive for applying automation is to increase productivity, and/or quality beyond that possible with current human labor levels so as to realize economies of scale, and/or realize predictable quality levels. In the scope of industrialisation, automation is a step beyond mechanization. Whereas mechanization provides human operators with machinery to assist them with the muscular requirements of work, automation greatly decreases the need for human sensory and mental requirements while increasing load capacity, speed, and repeatability. Automation plays an increasingly important role in the world economy and in daily experience. Automation has had a notable impact in a wide range of industries beyond manufacturing (where it began). Once-ubiquitous telephone operators have been replaced largely by automated telephone switchboards and answering machines. Medical processes such as primary screening in electrocardiography or radiography and laboratory analysis of human genes, sera, cells, and tissues are carried out at much greater speed and accuracy by automated systems. Automated teller machines have reduced the need for bank visits to obtain cash and carry out transactions. In general, automation has been responsible for the shift in the world economy from industrial jobs to service jobs in the......

Words: 1182 - Pages: 5

Free Essay

Computer Hacking, Ethical or Not

...Mashell Chapeyama Ethics and social responsibility Topic: Ethics and hacking Year 2012 Level: Bachelor of Science in Business Administration Key words: computer hacking, ethics Hacking In this discussion I will talk of hacking as it relates to computers and technology. The term hacking and the practice of hacking originated at Massachusetts institute of Technology (MIT). In this regard, hacking dealt with exploration of equipment and infrastructure, for the love of exploration or for learning or showing one’s cleverness. The students and other intellectuals wanted to learn more about things; they wanted to find ways of solving some problems or challenges which they found in life. So they became more devoted to this practice of exploring things, especially in areas which they had a lot of experience and expertise. The hackers experimented with computers and they even experimented with building or other infrastructural components. May people agree that it is very difficult to come up with a concise definition of hacking. However from my reading the simplest interpretation of hacking is that it is the act of observing some weakness in systems and finding ways to overcome such problems or challenges. A computer hacker in this respect would mean a person who has skills in computers who want to identify some problems and weaknesses in the computer system and then devise solution to such problems, for the purpose of learning or just challenging the existing system.......

Words: 663 - Pages: 3

Free Essay


...White hat hackers are the ethical, legal hackers (2002). Companies pay them to find holes in software or networks and fix the problems. The difference between white hat hackers and black hat hackers is that white hats have permission to carry out their attacks on a company to fix the problems. (2) A majority of company owners say that white hat protection is the only true way to ensue security in their businesses. White hats use the same programs and knowledge as black hats do. They usually stay in the cyber underworld to keep updated on attacks and information. Black hat hackers are the most rare and elite of all the hacker groups. Most are connected with criminal activities, such as espionage. (2001) Not all hackers labeled black hat hackers are connected with criminal activities in real life. There are many "old school" hackers considered black hat. They are the ones that are usually from the 1960's and use the word hacker with honor and freedom. (Quinter 2) Most of these hackers do not have a negative intent they are usually programs from Stanford or MIT. They have good ethics and believe in open source and fixing flaws in programming. Most black hat hackers are criminals and are very powerful. (Glenn 8) Political and personal revenge is a major motivating factor in becoming a true black hat hacker, but the most elite hackers go for the money. Industrial espionage is one of the best paid jobs for a hacker. A typical espionage attacks takes about three weeks and they...

Words: 4683 - Pages: 19